What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
CISA adds two known exploited vulnerabilities to its catalog
CISA has added two new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2009-0238 Microsoft Office Remote Code…
-
Multiple vulnerabilities in Mozilla products could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-032ISSUE DATE(S):04/07/2026PREVIEW:Several vulnerabilities have been discovered in Mozilla products, the most serious of which could allow the execution of arbitrary code. Mozilla Firefox…
-
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
Advisory at a Glance Title Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure Original Publication April 7, 2026 Executive Summary Iran-affiliated advanced…
-
CISA adds known exploited vulnerability to its catalog
CISA has added a new vulnerability to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2026-3502 TrueConf client downloads code…













